Vulnerabilities (CVE)

Filtered by CWE-287
Total 3710 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-40703 1 Alivecor 1 Kardia 2024-11-21 N/A 5.2 MEDIUM
CWE-302 Authentication Bypass by Assumed-Immutable Data in AliveCor Kardia App version 5.17.1-754993421 and prior on Android allows an unauthenticated attacker with physical access to the Android device containing the app to bypass application authentication and alter information in the app.
CVE-2022-40622 1 Wavlink 2 Wn531g3, Wn531g3 Firmware 2024-11-21 N/A 8.8 HIGH
The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.
CVE-2022-40536 1 Qualcomm 162 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 159 more 2024-11-21 N/A 7.5 HIGH
Transient DOS due to improper authentication in modem while receiving plain TLB OTA request message from network.
CVE-2022-40521 1 Qualcomm 484 315 5g Iot Modem, 315 5g Iot Modem Firmware, 8953pro and 481 more 2024-11-21 N/A 7.5 HIGH
Transient DOS due to improper authorization in Modem
CVE-2022-40259 1 Ami 1 Megarac Sp-x 2024-11-21 N/A 8.3 HIGH
MegaRAC Default Credentials Vulnerability
CVE-2022-40242 1 Ami 1 Megarac Sp-x 2024-11-21 N/A 7.5 HIGH
MegaRAC Default Credentials Vulnerability
CVE-2022-40144 2 Microsoft, Trendmicro 2 Windows, Apex One 2024-11-21 N/A 9.8 CRITICAL
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations.
CVE-2022-3875 1 Clickstudios 1 Passwordstate 2024-11-21 N/A 7.3 HIGH
A vulnerability classified as critical was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This vulnerability affects unknown code of the component API. The manipulation leads to authentication bypass by assumed-immutable data. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216244.
CVE-2022-3681 1 Motorola 1 Mr2600 2024-11-21 N/A 6.5 MEDIUM
A vulnerability has been identified in the MR2600 router v1.0.18 and earlier that could allow an attacker within range of the wireless network to successfully brute force the WPS pin, potentially allowing them unauthorized access to a wireless network.
CVE-2022-3465 1 Mediabridgeproducts 2 Mlwr-ac1200r, Mlwr-ac1200r Firmware 2024-11-21 N/A 7.3 HIGH
A vulnerability classified as critical was found in Mediabridge Medialink. This vulnerability affects unknown code of the file /index.asp. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210700.
CVE-2022-3218 1 Necta 1 Wifi Mouse Server 2024-11-21 N/A 9.8 CRITICAL
Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.
CVE-2022-3173 1 Snipeitapp 1 Snipe-it 2024-11-21 N/A 4.3 MEDIUM
Improper Authentication in GitHub repository snipe/snipe-it prior to 6.0.10.
CVE-2022-3156 1 Rockwellautomation 1 Studio 5000 Logix Emulate 2024-11-21 N/A 7.8 HIGH
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software.  Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.
CVE-2022-3152 1 Php-fusion 1 Phpfusion 2024-11-21 N/A 8.8 HIGH
Unverified Password Change in GitHub repository phpfusion/phpfusion prior to 9.10.20.
CVE-2022-39901 1 Samsung 2 Exynos, Exynos Firmware 2024-11-21 N/A 6.5 MEDIUM
Improper authentication in Exynos baseband prior to SMR DEC-2022 Release 1 allows remote attacker to disable the network traffic encryption between UE and gNodeB.
CVE-2022-39899 1 Google 1 Android 2024-11-21 N/A 5.7 MEDIUM
Improper authentication vulnerability in Samsung WindowManagerService prior to SMR Dec-2022 Release 1 allows attacker to send the input event using S Pen gesture.
CVE-2022-39892 1 Samsung 1 Pass 2024-11-21 N/A 3.6 LOW
Improper access control in Samsung Pass prior to version 4.0.05.1 allows attackers to unauthenticated access via keep open feature.
CVE-2022-39387 1 Xwiki 1 Openid Connect 2024-11-21 N/A 9.1 CRITICAL
XWiki OIDC has various tools to manipulate OpenID Connect protocol in XWiki. Prior to version 1.29.1, even if a wiki has an OpenID provider configured through its xwiki.properties, it is possible to provide a third party provider its details through request parameters. One can then bypass the XWiki authentication altogether by specifying its own provider through the oidc.endpoint.* request parameters (or by using an XWiki-based OpenID provider with oidc.xwikiprovider. With the same approach, one could also provide a specific group mapping through oidc.groups.mapping that would make his user automatically part of the XWikiAdminGroup. This issue has been patched, please upgrade to 1.29.1. There is no workaround, an upgrade of the authenticator is required.
CVE-2022-39360 1 Metabase 1 Metabase 2024-11-21 N/A 6.5 MEDIUM
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login.
CVE-2022-39355 1 Discourse 1 Patreon 2024-11-21 N/A 9.1 CRITICAL
Discourse Patreon enables syncronization between Discourse Groups and Patreon rewards. On sites with Patreon login enabled, an improper authentication vulnerability could be used to take control of a victim's forum account. This vulnerability is patched in commit number 846d012151514b35ce42a1636c7d70f6dcee879e of the discourse-patreon plugin. Out of an abundance of caution, any Discourse accounts which have logged in with an unverified-email Patreon account will be logged out and asked to verify their email address on their next login. As a workaround, disable the patreon integration and log out all users with associated Patreon accounts.